Generation of IDS Signatures through Exhaustive Execution Path Exploration in PoC Codes for Vulnerabilities.
Masaki KobayashiYo KanemotoDaisuke KotaniYasuo OkabePublished in: J. Inf. Process. (2023)
Keyphrases
- intrusion detection system
- intrusion detection
- information security
- denial of service
- execution model
- data sets
- generation process
- dos attacks
- shortest path
- network security
- error correction
- security risks
- neural network
- computer systems
- dynamic environments
- data mining techniques
- feature vectors
- endpoints
- security issues
- signature verification
- data mining